Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Improved artificial bee colony algorithm with enhanced exploitation ability
ZHANG Zhiqiang, LU Xiaofeng, SUN Qindong, WANG Kan
Journal of Computer Applications    2019, 39 (4): 949-955.   DOI: 10.11772/j.issn.1001-9081.2018091984
Abstract463)      PDF (930KB)(399)       Save
The basic Artificial Bee Colony (ABC) algorithm has some shortcomings such as slow convergence, low precision and easily getting trapped in local optimum. To overcome these issues, an improved ABC algorithm with enhanced exploitation ability was proposed. On one hand, the obtained optimum solution was directly introduced into the search equations of employed bees in two different ways and guided the employed bees to perform neighborhood search, which enhanced the exploitation or local search ability of the algorithm. On the other hand, the search was performed by the combination of the current solution and its random neighborhood in the search equations of onlooker bees, which improved the global optimization ability of the algorithm. The simulation results on some common benchmark functions show that in convergence rate, precision, and global optimization or exploration ability, the proposed ABC algorithm is generally better than the other similar improved ABC algorithms such as global best ABC (ABC/best) algorithm, and some ABC algorithms with hybrid search strategy such as ABC algorithm with Variable Search Strategy (ABCVSS) and Multi-Search Strategy Cooperative Evolutionary (ABCMSSCE).
Reference | Related Articles | Metrics
Angular interval embedding based end-to-end voiceprint recognition model
WANG Kang, DONG Yuanfei
Journal of Computer Applications    2019, 39 (10): 2937-2941.   DOI: 10.11772/j.issn.1001-9081.2019040757
Abstract369)      PDF (827KB)(250)       Save
An end-to-end model with angular interval embedding was constructed to solve the problems of complicated multiple steps and weak generalization ability in the traditional voiceprint recognition model based on the combination of identity vector (i-vector) and Probabilistic Linear Discriminant Analysis (PLDA). A deep convolutional neural network was specially designed to extract deep speaker embedding from the acoustic features of voice data. The Angular Softmax (A-Softmax), which is based on angular improvement, was employed as the loss function to keep the angular interval between the different classes of features learned by the model and make the clustering of the similar features closer in the angle space. Compared with the method combining i-vector and PLDA, it shows that the proposed model has the identification accuracy of Top-1 and Top-5 increased by 58.9% and 30% respectively and has the minimum detection cost and equal error rate reduced by 47.9% and 45.3% respectively for speaker verification on the public dataset VoxCeleb2. The results verify that the proposed end-to-end model is more suitable for learning class-discriminating features from multi-channel and large-scale datasets.
Reference | Related Articles | Metrics
File hiding based on capacity disguise and double file system
WANG Kang, LI Qingbao
Journal of Computer Applications    2016, 36 (4): 979-984.   DOI: 10.11772/j.issn.1001-9081.2016.04.0979
Abstract486)      PDF (929KB)(401)       Save
Concerning the poor robustness and low hiding strength of existing file hiding method based on Universal Serial Bus (USB), a new file hiding method based on capacity disguised and double file system was proposed. By analyzing the characteristics and management mechanism of Nand flash chips, the capacity disguise was achieved to deceive the host by tampering equipment capacity value in Command Status Wrap (CSW). Based on the memory management mechanism of the Flash Translation Layer (FTL), the storage area was divided into two parts including the hiding area and the common area by different marks, and a double file system was established using format function. Request for switching file system was sent by writing specific data, then it was achieved after user authentication to realize secure access to hiding areas. The experimental results and theoretical analysis show that the proposed method can achieve hiding file which is transparent to operating system, moreover, it is not affected by device operation and has better robustness and stronger hiding effect with respect to the methods based on hooking Application Programming Interface (API), modifying File Allocation Table (FAT) or encryption.
Reference | Related Articles | Metrics
Design and implementation of context driven SoftMan knowledge communication framework
WU Danfeng, XU Xiaowei, WANG Kang
Journal of Computer Applications    2015, 35 (1): 131-135.   DOI: 10.11772/j.issn.1001-9081.2015.01.0131
Abstract543)      PDF (762KB)(458)       Save

This thesis focused on the traditional and message-based SoftMan's communication approach which has some problems in the aspects of expression ability, communication efficiency and quality. Based on the early research in SoftMan system and its communication theory, as well as SoftMan cogmatics model and context awareness mechanism, this thesis proposed the Context driven SoftMan Knowledge Communication (CSMKC) framework by learning from mature Agent communication language specification. First, the message layer, the knowledge layer and the scenarios layer in knowledge communication framework were designed; second, from the three aspects of implementation of message layer, knowledge layer and scenarios layer, the key points of knowledge communication achievements of scenario-driven SoftMan were introduced; finally, different SoftMan's communication in knowledge grade and the maintenance of scenario context were realized basically. The experimental results show that when the later content has high dependence on communication scenario, compared with the traditional message-based SoftMan communication approach, the communication overhead per unit time of CSMKC reduces by 46.15% averagely. Thus, the higher dependence on the scene, the more obvious CSMKC advantages in terms of reducing communication while accomplishing a task in the system.

Reference | Related Articles | Metrics